10.07.2015 Views

5cjxburmr

5cjxburmr

5cjxburmr

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

technological developments or gaining information about an adversary’s military capabilities andintent.16.1.2.2 Examples of Operations That Would Not Be Regarded as CyberOperations. Cyber operations generally would not include activities that merely use computersor cyberspace without a primary purpose of achieving objectives or effects in or throughcyberspace. For example, operations that use computer networks to facilitate command andcontrol, operations that use air traffic control systems, and operations to distribute informationbroadly using computers would generally not be considered cyber operations.Operations that target an adversary’s cyberspace capabilities, but that are not achieved inor through cyberspace, would not be considered cyber operations. For example, thebombardment of a network hub, or the jamming of wireless communications, would not beconsidered cyber operations, even though they may achieve military objectives in cyberspace.16.1.3 Cyber Operations – Notes on Terminology. DoD doctrine and terminology forcyber operations continue to develop.16.1.3.1 “Cyber” Versus “Cyberspace” as an Adjective. The terms “cyber” and“cyberspace” when used as an adjective (e.g., cyber attack, cyber defense, cyber operation) aregenerally used interchangeably.16.1.3.2 Cyber Attacks or Computer Network Attacks. The term “attack” oftenhas been used in a colloquial sense in discussing cyber operations to refer to many different typesof hostile or malicious cyber activities, such as the defacement of websites, network intrusions,the theft of private information, or the disruption of the provision of internet services.Operations described as “cyber attacks” or “computer network attacks,” therefore, are notnecessarily “attacks” for the purposes of applying rules on conducting attacks during the conductof hostilities. 6 Similarly, operations described as “cyber attacks” or “computer network attacks”are not necessarily “armed attacks” for the purposes of triggering a State’s inherent right of selfdefenseunder jus ad bellum. 716.2 APPLICATION OF THE LAW OF WAR TO CYBER OPERATIONSSpecific law of war rules may apply to cyber operations, even though those rules weredeveloped before cyber operations were possible. When no more specific law of war rule orother applicable rule applies, law of war principles provide a general guide for conduct duringcyber operations in armed conflict.16.2.1 Application of Specific Law of War Rules to Cyber Operations. Specific law ofwar rules may be applicable to cyber operations, even though these rules were developed longbefore cyber operations were possible.6 Refer to § 16.5.1 (Cyber Operations That Constitute “Attacks” for the Purpose of Applying Rules on ConductingAttacks).7 Refer to § 16.3.3 (Responding to Hostile or Malicious Cyber Operations).996

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!